Evaluate the three checklist files provided for the firewall, router, and switchSTIGs. In the virtual desktop, use
Fantastic news! We've Found the answer you've been seeking!
Question:
- Evaluate the three checklist files provided for the firewall, router, and switchSTIGs.
- In the virtual desktop, use the STIG viewer to evaluate the three checklist files provided for the firewall, router, and switch STIGs.
Then, in one-two pages (including a cover sheet), address the following:
- make a table showing the vulnerabilities associated with each asset.
- Evaluate which assets should be prioritized for mitigation or remediation.
- Explain your rationale.
Related Book For
Principles of Information Systems
ISBN: 978-0324665284
9th edition
Authors: Ralph M. Stair, George W. Reynolds
Posted Date: